According to the Taipei Times, a cabinet minister says government officials believe Chinese hackers have tapped into databases belonging to the Democratic Progressive Party and stolen classified information.
Taiwanese government officials believe Chinese hackers have broken into databases belonging to the Democratic Progressive Party, the Taipei Times reported Wednesday, citing an unidentified Cabinet official as its source.
"The incident has sent jitters through the Ministry of National Defense, which deems a systematic information attack launched by China as military warfare," the paper quoted the Cabinet official as saying. The official said that the hackers stole classified information pertaining to upcoming visits to the United States by high-ranking Taiwanese government officials, the paper reported. The official also said the personal itineraries of President Chen Shui-bian and other party officials were stolen.
This isn't the only recent allegation of potentially state-sponsored cyberattacks. On May 27, Agence France-Presse cited South Korea's highest ranking military intelligence official, Song Young-Keun, commanding general of the Defense Security Command, as saying that North Korea is operating a highly skilled military hacking unit focused on breaching South Korean computer systems.
The AFP report quoted Young-Keun claiming that the North Korean hackers were stealing classified information from research institutes and government agencies.
"It should be no surprise to anyone that this is going on," says John Watters, president and CEO at security intelligence services provider iDefense Inc. "The surprise is that this is making the press and countries are acknowledging that they've been hacked."
Watters says it appears that some governments often work with rogue hacking groups to attack other nations, rather than use their own military hackers. "They don't want it proven that they were directly involved in the attack, which would be seen as an act of cyberwar," he adds.
Watters says there's no direct proof that such attacks are conducted in conjunction with nation states. "But there certainly appears to be some connectedness between the actions of hacker groups and the interests of certain countries," he says. "They appear to be often working in parallel."
Watters says most countries have military hacking groups which collect their own arsenal of digital weapons, including software vulnerabilities and exploit code that haven't been made public.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.